CyberArk Announces New Capabilities for CyberArk Viewfinity that Deliver Privileged Account Security to the Endpoint

Following the acquisition of Viewfinity in Q4 2015, CyberArk Viewfinity is now available as part of the CyberArk Privileged Account Security Solution. With the new release, version 5.5, organizations would be able to gain greater privilege management and application control features in an on-premises or software-as-a-service (SaaS)-based offering. 

With CyberArk Viewfinity v5.5, organizations would be able to benefit from an enhanced, single privilege management and application control solution to reduce the attack surface while being able to block the progression of malware-based attacks, and balance business user productivity and enterprise security.

New integration with the CyberArk Shared Technology Platform enables all privileged audit logs to be stored and reviewed centrally, as well as new flexible, customizable reporting capabilities.

Enhanced CyberArk Viewfinity features include:

  • cyberark endpoint securityGrey Listing – Monitor ‘grey’ applications – those that are not specifically trusted (white listed) or blocked (black listed) – and apply policies such as restrictive access mode until the application can be further researched.
  • Application Catalog – The Application Catalog displays information on applications installed on end-user computers managed by CyberArk Viewfinity and allows quick discovery of new applications in the system.
  • Application Intelligence – Provides support for application forensic and investigation processes; an aggregated historical timeline is compiled for each application with details such as first seen in the organization, where installed, original source and full family tree.
  • Trusted Sources – This privilege management capability allows System Administrators to automatically create application control and privilege elevation policies based on Trusted Sources such as System Center Configuration Manager (SCCM), software distributors, updaters and more. Trusted Sources can be used to automate the creation of privilege policies for more than 90 percent of applications within the organization. 

“As malware continues to be a frequently-used and successful means for hijacking credentials, organizations must realize that the endpoint problem is a privilege problem,” said Roy Adar, senior vice president, product management, CyberArk. “The fact is, motivated attackers will eventually get inside your network – it’s what happens next that matters. Establishing a foothold on endpoints and escalating privileges enables attackers to jump from endpoints, to servers, to domain controllers until they own the network. CyberArk Viewfinity extends privilege security to the endpoint to mitigate these risks without excessively restrictive controls on users.”

Inxy Hosting CDN Marketplace